LX0-102
You login server is using PAM, and you want to limit users' access to system resources. Which configuration file will you need to edit?
/etc/security/limits.conf
Which of the following lines identify valid shell scripts on a normally configured system?
#! /bin/bash #! /bin/sh
which of the following configuration files does the logrotate program consult for its settings?
/etc/logrotate.conf
What network port would an IMAP set never use for IMAP exchanges
143
Which of the following lines, if used in a user cron job, will run /usr/local/bin/cleanup twice a day
15 7,19*** /usr/local/bin/cleanup
Which of the following is a valid IPv4 address for a single computer on a TCP/IP network
63.63.63.63
what information about print jobs does the lpq command display
A numerical job ID that can be used to manipulate the Job and The username of the person who submitted the job.
What types of files might you expect to find in /etc/skel
An empty set of directories to encourage good file management practices. A README or similar welcome file for new users. A starting .bashrc file.
Your SMTP email server, mail.luna.edu, receives a message addressed to postmaster@ mail.luna.edu there is no postmaster account on this computer. Assuming the system is properly configured, how should the email server respond
Deliver the email to another account, either locally or on another computer.
You/ve discovered that the waiter program (a network server) is running inappropriately on your computer. You therefore locate its SysV startup script and shut it down by removing the script from you default runleve. How can you further reduce the risk that the Waiter program will be abused by outsiders?
By blocking the Waiter program's port using a firewall rule and/or by uninstalling the Waiter package.
What file might a suer modify to alter his or her own bash environment
~/.barshrc
You manage a computer that's located in Los Angeles, California, but the time zone is misconfigured as being in Tokyo, Japan. What procedure can you follow to fix this problem
Delete /etc/localtime, and replace it with an appropriate file from /usr/share/zoneinfo. or Use the tzselect program to select a new (Los Angeles) time zone.
How can you reconfigure Linux to use DNS queries prior to consulting /etc/hosts
Edit /etc/nsswitch.conf, and change the oder of the files and dns options on the hosts: line
How would you change the text displayed by XDP as a greeting
Edit the /etc/X11/xdm/Xresources file, and change the text in the xlogin*greeting line.
Your internet connection has gone down for several hours. What is true of email sent by our users to off-site recipients via properly configure local SMTP server?
Email will be delayed by a few hours but not lost.
You've developed a script that uses several Linux commands and edits their output. You want to be sure that the script runs correctly on a computer in Great Britain, although you're located elsewhere, since the output includes features such as currency symbols and decimal numbers that are different from one nation to another. What might you do to test this?
Type export LC ALL=en_GB.UTF-8, and run the script from the same shell you used to type this command.
You've downloaded a GPG public key from a Web site, into the file fredkey.pub. What mush you do with this key to use it?
Type gpg --import fredkey.pub
Which of the following is not a popular SMTP server for Linux?
Fetchmail
To assist an employee who has trouble with keyboard repeat features, you've disabled this function in /etc/X11/xorg.conf. Why might this step not be sufficient to the goal of disabling keyboard repeat?
GNOME, KDE, or other desktop environment settings for keyboard repeat may override those set in xorg.conf
In what section of XF86Config or xorg.conf do you specify the resolution that you want to run?
In the Screen section, subsection Display, using the Modes option
What is an advantage of a font server
It can simplify font maintenance on a network with many X servers.
What is the purpose of the -n option to route?
It causes machines to be identified by ip address rather than hostname in output.
Describe the effect of the following short script, cpm, if its called as cpl big.c big.cc: #! /bin/bash cp $2 $1
It copies the contents of big.cc.to big.c, eliminating the old big.c
Which of the following describes the function of a smart filter.
It detects the type of a file and passes it through programs to make it printable on a given model of printer.
what is the purpose of /etc/hostname, if its present on the system?
It holds the computer's default hostname.
what is the purpose of /etc/reslov.conf
It sets the computer's default search domain and identifies (by IP address) the name servers that the computer may use.
What is the effect of the following SQL command, as suing the various names and data exist? mysql> UPDATE stars SET magnitude=2.25 WHERE starname='Mintaka';
It sets the value of the magnitude field to 2.25 for any item in the stars table with the star name Mintaka
Which of the following entries are found in the /etc/hosts file
Mappings of IP addresses to hostnames.
The /etc/sudoers file on a computer includes the following line, what is the effect? %admin ALL=(ALL) ALL
Members of the admin group may run all programs with root privileges by using sudo.
Which of the following are true statements about SQL tables?
Multiple tables may exist in a single SQL database and Careful table design can reduce the amour of data entry and database storage size
Where is the best location for the current directory indicator(.) to reside in root's PATH environment variable?
Nowhere; it shouldn't be in the root's path
as a part of a security audit, you plan to use mmap to check all the computer on your network for unnecessary servers. Which of the following tasks should you do prior to running your Nmap check?
Obtain written permission from your boss to perform the Nmap sweep
Which of the rolling programs may be used to provide computer-generate speech for users who have trouble reading computer displays.
Orca Emacspeak
In what environment variable is the current working directory stored?
PWD
Which of the following types of attacks involves sending bogus email to lure unsuspecting individuals into divulging sensitive financial or other information?
Phishing
How might you schedule a script to run once a day on a Linux computer
Place the script, or a link to it, in /etc/cron.daily or Create a user cron job that calls the specified script once a day at a time of your choosing, and install that cron job using crontab.
for best SSH server security, how should you set the protocol option in /etc/ssh/sshd_config?
Protocol 2
Using a packet sniffer, you notice a lot of traffic directed at TCP port 22 on a local computer. What protocol does this traffic use, assuming its a stander port
SSH
When you configure an X server, you need to make changes to configuration files and then start or restart the X server. Which of the following can help streamline this process?
Shut down X by switching to a runlevel in which X doesn't run automatically, and then reconfigure it and use startx to test X startup
Why is it unwise to allow root to log on directly using SSH
Somebody with the root password but no other password can then break into the computer.
What methods do Linux distributions use to start X automatically when the system boots.
Start an XDMCP server via a system startup script. OR Start an XDMCP server from init.
You've submitted several print jobs, but you've just realized that you mistakenly submitted a huge document that you didn't want to print. Assuming you can identify which job this was, that it's not yet printing, and that its job ID number is 749, what command would you type to delete if from the okidata print queue?
Type lprm -Pokidata 749
What do the following commands accomplish? (the administrator presses Ctrl+D after typing the second command.) # at teatime at> /usr/local/bin/system-maintenance
The /usr/local/bin/system-maintenance program or script is run at 4:00pm
which of the following types of information are returned by typing ifconfig eth0
The IP address assigned to eth0 and The hardware address of eth0
Which of the following features do KDM and GDM provide that XDM doesn't?
The ability to select the login environment from a menu on the main login scree.
Which of the following summarizes the organization of the X configuration file?
The file is broken into sections, one or more for each component (keyboard, video card, and so on). The file also has one or more sections that define how to combine the main sections.
which of the following programs is conventionally used to preform a DNS lookup
The host program
What will be the effect of a computer having the following two lines in /etc/ntp.conf server pool.ntp.org server tardis.example.org
The local computer's NTP server will poll both a server in the public NTP server pool and tardis.example.org and use whichever site provides the cleanest time data.
A monitor's manual lists its range of acceptable synchronization values as 27-96kHz horizontal and 50-160Hz vertical. What implications does this have for the resolutions and refresh rates the monitor can handle?
The monitor can handle up to 160Hz vertical refresh rate depending on the resolution.
You're configuring a new system, and your network administrator scribbles its IP address (172.25.78.89), netmask (255.255.255.0) gateway address (172.25.79.1), and DNS server address (10.24.89.201) on a piece of paper. You enter this information into your configuration files and type ifup eth0, but you find that you can't access the internet with this computer. Which of the following is definitely true?
The netmask identifies the gateway as being on a different network segment than the computer you're configuring, so the two can't communicate directly. You most likely misread one of the address.
Ordinary users report being unable to log onto a computer, but root has bo problems doing so. what might you check for to expelling this situation
The presence of an /etc/nologin file.
As root, you type date 12110710. What will be the effect?
The software clock will be set to 7:10 a.m. December 11 of the current year.
An administrator types chage -M 7 time. What is the effect of this command.
The time account's password must be changed at least once every seven days.
What is wrong with the following /etc/passwd file entry? 4sally:x:1029:Sally Jones:/home/myhome:/bin/passwd
The username is invalid; Linux users names can't begin with a number. and Either the UID or the GID field is missing
Why are groups important to the Linux user administration and security models.
They can be used to provide a set of users with access to files without giving all users access to the files.
What is the purpose of conditional expressions in shell scripts?
They enable the script to take different actions in response to variable data.
which of the following is generally true of Linux programs that print
They produce PostScript output for printing
Which types of network hardware does Linux Support?
Token Ring, Ethernet and Fibre Channle
You're just installed MySQL and run it by typing mysql. How would you create a database called fish to store data on different varieties of fish?
Type REATE DATABASE fish; at the mysql> prompt.
You're configuring a Linux system that doesn't boot from any other OS. What is recommended time to which the computer's hardware clock should be set.
UTC
Which character set encoding is the preferred method on modern linux systems?
UTF-8
You find that the ssh_host_dsa_key file in /etc/ssh has 0666 permissions. Your SSH server has been in operation for several months. should you be concerned?
Yes
You want to send an encrypted message to an email correspondent. You both have GPG. what do you need to exchange before you can send your encrypted message.
You must obtain your correspondent's GPG public key.
You what to set up a computer on a local network via static TCP/IP configuration, but you lack a gateway address. Which of the following is true
You'll be able to communicate with machines on your local network segment but not with other systems.
The ping utility responds normally when you use it with an IP address but not when you use it with a hostname that you're positive corresponds to this IP address. What might cause this problem.
Your computer's DNS configuration may be broken. or The route between your computer and its DNS server may be incorrect.
To diagnose a problem with an IMAP server (imap.example.com), you type telnet imap.example.com 143 from a remote client. How can this procedure help you?
ad You can verify basic connectivity between the client computer and the server program. or once connected, you can type IMAP commands to test the server's response to them
You want to create a shortcut for the command cd ~/papers/trade. Which of the following lines, if entered in a bash startup script, will accomplish this goal.
alias cdpt='cd ~/papers/trade'
You se the following line in a script: mail -s "Error" -c abort </tmp/msg root
an email with the subject of Error and the contents from /tmp/msg is sent to the local users root and abort.
You're installing Linux on a laptop computer. Which of the following programs might you want to add to ensure that log rotation is handled correctly?
anacron
Your manager has asked that you configure logrotate to run on regular, unattended basis. What utility feature should you configure to make this possible
cron
which of the following commands might bring up an interface on eth1
dhclient eth1 and ifup eth1
Which of the following are not Linux DCHP clients
dhcpd and ifconfig
You examine your /etc/aliases file and fine it contains the following line root: jody what can you conclude from this?
email addressed to root on this system will be sent to the local user jody.
Which of the following system logging codes represents the highest priority?
emerg
You want to use xinetd access controls to limit who may access a server that's launched via xinitd. specifically, only users on the 192.168.7.0/24 network block should be able to use that server. how may you do this?
enter only_from = 192.168.7.0/24 in the /etc/xinetd.d configuration file for the server in question
What commands might you use (along with appropriate options) to learn the value of a specific environment variable?
env, and echo.
Which of the following commands if typed in a bash shell, will create an environment variable called MYVAR with the contents my stuff that will be accessible to subsequently launched programs?
export MYVAR='mystuff'
which of the following commands will locate all program files on a computer which the SUID bit is set
find / -perm +4000 -type f
Which of the following tasks are most likely to be handled by a cron job.
finding and deleting old temporary files monitoring the status of servers and e-mailing a report to the superusers.
Which of the following are valid looping statements in bash shell scripting
for while until
A server/computer combination appears in both hosts.allow and hosts.deny. What's the result of this configuration when TCP wrappers runs
host.allow takes precedence; the client is grated access to the server.
You've set your system (software) clock on a Linux-only computer to the correct time, and now you want to set the hardware clock to match. What command might you type to accomplish this goal?
hwclock --utc --systohc
of the following, which is the best password
iA710ci^My~~~~~~
Which of the following is a legal Linux username that will be accepted by useradd
larrythemoose
You want to create a log file entry nothing that you're manually shutting down the system to a a new network card. how might you create this log entry, just prior to using shutdown?
logger shutting down to add network card.
You want sally, tom, and dale to be members of the group managers (GID 501) How would you edit the managers entry in /etc/group to accomplish this goal?
managers:x:501:dale, sally, tom
What tool might you use to print a four-page PostScript file on a single sheet of paper?
mpage
Which command would you type, as root to discover all the open network connections on a line computer?
netstat -ap
How can you learn what programs are currently accessing the network on a Linux system
netstat -p
Which of the rolling tools might you use to check for open ports on a local computer?
nmap, netstat and lsof
Typing lsof -i | grep LISTEN AS root produces three lines of output, corresponding to the sendmail, sshd and prftpd servers. what can you conclude about the security of this system
no conclusion can be draw without further information; the listed server may or may not be appropriate or authentic.
You've configured one compter (gateway.pangaea.edu) om your five-computer network as an NTP server that obtains its time signal from ntp.example.com What computer(s) should your network's other computer use as their time source(s)
only gateway.pangaea.edu
when is the bind option of xinitd most useful?
when xinitd is running on the system with two network interfaces.
Which of the rolling commands tells the X server to accept connections from penguin.example.com
xhost +penguin.example.com
which of the following commands should you type to add to host 192.168.0.10 a default gateway to 192.16.8.0.1
route add default gw 192.168.0.1
After using a text editor to create a shell script, what step should you take before trying to use the script
set one or more executable bit using chmod
What is the purpose of the EDITOR environment variable?
some programs refer to EDITOR to determine what external editor to launch when they need to launch one.
Which servers might you consider retiring ager activating an SSH server
telnet and ftp
Network accesses to parts of the internet work fine, but several common sites have stopped responding (even when addressed via raw IP addresses). Which of the following tools will be most helpful in diagnosing the source of the problem
traceroute
What would a Linux system administrator type to remove the memo account and its home directory?
userdel -r nemo